Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
This is the author copy of the paper " A Survey on Near Field Communication (NFC) Technology".
For the latest version, please go to http://link.springer.com/article/10.1007%2Fs11277-012-0935-5
Citation:
Coskun, V., Ozdenizci, B., & Ok, K. (2013). A Survey on Near Field Communication (NFC)
Technology. Wireless personal communications, 71(3), 2259-2294.
1. Introduction
Ubiquitous computing and most recently ambient intelligence are defined as
technology becomes invisible, embedded, and is enabled by simple interactions, attuned
to all our senses and adaptive to users and contexts [14]. Nowadays, technology has
been invisibly embedded into daily objects and they are becoming more and more
ubiquitous. The increasing mobility of computing devices provided by mobile
communications becomes an important step in the development of ubiquitous computing.
Mobile phones had already several communication options with the external
environments before the introduction of NFC technology. When the mobile phones were
initially introduced, the primary goal was to enable voice communication with the mobile
and wired phones. GSM (Global System for Mobile Communications) communication
enabled functionality of mobile phones for several services, such as voice
communication, SMS (Short Messaging Service), MMS (Multimedia Messaging Service)
and even Internet access. Bluetooth technology was introduced later to create personal
area wireless networks that connect peripherals with computing devices including mobile
phones.
Currently a new way of interaction approach by NFC technology, which is touching
paradigm, has been in question. This interaction can be identified as "the deliberate
bringing together of two devices, for the purpose of obtaining services" [17]. NFC as one
of the enablers for ubiquitous computing is a combination of contactless identification
and interconnection technologies [95] which requires bringing two NFC compatible
devices close to each other, essentially touching them. In accordance with [36], user first
interacts with a smart object (either an NFC tag, NFC reader, or another NFC enabled
mobile phone) using her NFC enabled mobile phone (in short: NFC mobile). After
touching occurs, NFC mobile may further make use of received data, or may alternatively
use provided mobile services such as opening a web page, making a web service
connection etc.
Smart Objects
Touch Based
Interaction
personal area and longer-range wireless networks. NFC relies on inductive coupling
between transmitting and receiving devices. The communication occurs between two
compatible devices within few centimeters with 13.56 MHz operating frequency [127,105,
89, 36].
Table 1. Comparison of WPAN Technologies [25, 88]
Parameter
Range
Data Rate
Cost
Power
Consumption
Spectrum
Security
Network Topology
Devices per
Network
Usability
Personalization
Flexibility
Setup Time
Bluetooth
10-100 m
0.8-2.1 Mbps
Low
Zigbee
10-100 m
0.02-0.2 Mbps
Low
NFC
4-10 cm
0.02-0.4 Mbps
Low
High
Medium
Low
2.4 GHz
Low
Piconets, Scatternets
2.4 GHz
Low
Star, Tree, Mesh
13.56 MHz
High
One to one
2 to 65000
Moderate, Data
Centric
Medium
High
Approx. 6 sec
Easy, Human
Centric
High
High
Less than 0.1 sec
The acting two parts of NFC communication is categorized as initiator and target
devices. The Initiator is the device that initiates and guides the data exchange process
between the parties. The target is the device that responds to the requests made by the
initiator. According to [34], NFC protocol distinguishes between two modes of operation,
which are active mode and passive mode. In the active communication mode both
devices uses their own energy to generate their own RF field to transmit the data. In the
passive communication mode only initiator generates the RF field while the target device
makes use of the energy that is created by the active device.
Table 2. Active vs. Passive Communication Mode [security paper]
Device A
Active
Active
Passive
Device B
Active
Passive
Active
RF Field Generation
Generated by both devices
Generated by Device A only
Generated by Device B only
Communication Mode
Active Mode
Passive Mode
Passive Mode
There exist three NFC devices, which can involve in NFC communication: NFC
mobile, NFC tag, and NFC reader. Table 3 shows the possible interaction styles among
those NFC devices. NFC technology operates in three different operating modes:
reader/writer, peer-to-peer, and card emulation modes where communication occurs
between an NFC mobile on one side, and an NFC tag, an NFC mobile, and an NFC
reader on the other side respectively [100, 127]. Each operating mode uses distinct
communication interfaces (i.e. ISO/IEC 14443, FeliCa, NFCIP-1, NFCIP-2 interfaces) on
RF layer as well as has different technical, operational and design requirements [41, 44,
127].
Target Device
NFC Mobile
NFC Tag
NFC Mobile
NFC Mobile
NFC Reader
NFC Mobile
In accordance with [36, 100, 127], the RF interface supports communication with data
rates of 106, 212 as well as 424 kbps as of today. As mentioned in [36, 162], NFC uses
different modulation schemes such as ASK (Amplitude Shift Keying) with different
modulation depth -100% or 10%- or load modulation and coding techniques such as
NRZ-L (Non-Return-to-Zero Level), Manchester and Modified Miller coding to transfer
data. In each NFC transaction, the NFC communication mode of an initiator or target NFC
devices (active or passive), the signaling and standards used in RF interface (NFCIP-1,
ISO/IEC 14443, JIS X 6319 Type F as FeliCa), and the data transfer rate is important in
defining the modulation and coding scheme that is used. The study [smart] shows the
summary of techniques used in NFC transaction depending on the direction of the
communication. ISO/IEC 18092 (NFCIP-1) is the combination of ISO/IEC 14443 Type A
and JIS X 6319 Type F]. The study [64] deals with the increase of data rates for proximity
coupling devices at 13.56MHz and NFC systems, and compares performance of ASK
and PSK modulation schemes in a real environment. It shows that PSK performs 23%
better in terms of field strength requirement and energy efficiency than ASK.
An NFC enabled mobile phone consists of secure element(s) for performing secure
transactions using NFC devices as well as storing sensitive data in a secure environment.
In accordance with [3, 60, 61, 143], secure element provides a dynamic and secure
environment for both programs and data. It enables storage of valuable, sensitive, and
private data such as credit card information of the user, and secure storage and
execution of NFC enabled services such as contactless payments, which is valid in card
emulation operating mode.
The mobile device may contain additional SEs based on the requirements. NFC
controller is connected to SEs through either Single Wire Protocol (SWP) [47] or NFC
Wired Interface (NFC-WI) [42]. However NFC literature does not include any comparison
analysis of both physical layers in terms of security, performance or other parameters yet.
The SE can be accessed and controlled from host controller (internally) as well as
from RF field (externally). The host controller, or baseband controller in other words, is
the heart of the NFC mobile. Host Controller Interface (HCI) creates a bridge between the
NFC controller and the host controller [48]. The host controller sets the operating modes
of the NFC controller through HCI, processes data that is sent and received, and
establishes the connection between the NFC controller and the secure element.
Baseband
Communication
Host Controller
ISO/IEC 7816
Interface
Host
Controller
Interface
Secure
Element
Mobile Network
Infrastructure
SWP or S2C
NFC
Controller
NFC Antenna
NFC Contactless
Front-End (CLF)
NFC Device
(1) NFC Tag
(2) NFC Mobile
(3) NFC Reader
The most important association that focuses on developing and improving the use of
short-range wireless interaction through NFC technology is NFC Forum [127]. It is a nonprofit industry association that was established with the aim of enabling NFC technology
at first, and making it spread around the world thereafter. The mission of NFC Forum is to
promote the usage of NFC technology by developing specifications, ensuring
interoperability among devices and services, and educating the market about NFC
technology. Up to now NFC Forum provided diverse specifications for the various
components of NFC technology such as LLCP (Logical Link Control Protocol) [124], NFC
Tag Types [125], NFC RTDs (Record Type Definitions) [120-123, 126] and so on. Hence
NFC literature does not include high amount of research issues in terms of
communication essentials; thus some experimental and performance testing studies can
be conducted.
The three NFC communication modes are defined based on which NFC device is
paired and performing communication with NFC mobile. The communication protocols,
standards, etc. differs for each operating mode.
Target
NFC
Tag
NFC Forum
Mandated
Tag Types
aspects of ISO/IEC 18092 and ISO/IEC 14443 standards, and define building
blocks of communication. There is also another important specification by
NFC Forum at this level which is NFC Activities Specification. This
specification defines the required activities that set up communication in an
interoperable manner based on digital protocol specification such as polling
cycles, when to perform collision detection.
Tag operations indicate the commands and instructions used by NFC devices
to operate NFC Forum mandated tags which are Type 1, Type 2, Type 3, and
Type 4. They enable read and write operations by using the NDEF data
format & RTDs (i.e. Smart poster, URI RTDs) from/to a tag.
NDEF applications are based on NDEF specifications such as smart poster
applications and reading product information from NFC enabled smart
shopping fliers.
Non NDEF applications are vendor specific applications which are not based
on NDEF specifications such as electronic purse balance reader and
contactless ticket reader.
Target
NF
C
NFC
Reader
Target
10
Non-Removable SEs
Removable SEs
Flexible SE Solutions
- Embedded Hardware
- Sticker
- Secure Memory
Card (SMC)
- Universal
Integrated Circuit
Card (UICC)
- Different
Combinations of SIM/
UICC, SMC,
embedded hardware,
NFC controller and
antenna
11
12
application activation data or an NFC application. Using GPRS/UMTS and the BIP
(Bearer Independent Protocol) protocol, applications are rapidly deployed OTA to the
UICC card.
Currently, most MNOs are capable of providing OTA solutions using their current
technology infrastructure. However, it is also possible to see that when required
infrastructure is set up by other entities, these entities can provide OTA service
independently from SE issuers or platform managers. One of the most appropriate cases
is to use OTA solution of Trusted Service Manager as a neutral entity within the NFC
ecosystem.
The studies [97, 100, 102] outline an infrastructure concept for setting up a
sustainable NFC ecosystem and introduce new concept as platform manager. According
to them, platform provider can be identified also as a Trusted Service Manager (TSM)
and is the key enabler for OTA transactions which acts as a middleman between service
providers and secure elements within NFC mobiles [36]. At the same time the initialization
and personalization of the SEs, the role of platform provider and outgo/income of each
stakeholder in this business model is analyzed. The major challenge is that the proposed
process involves several different components and instances, which indeed makes the
standardization process difficult. There is high amount of uncertified components within
NFC ecosystem; hence there is no proven security for the OTA transactions.
The proposed model [102] is a beneficial model for the NFC applications that require
OTA transactions. This model can also be studied on smart card web server (SCWS)
applets. However it can be further improved for protecting integrity and confidentiality of
the keys and personal data on SE and avoiding other possible risks.
13
some critical research issues are identified in this research area that can be examined,
improved, and evaluated by academicians as well as practitioners:
Verification of existing tools within the market such as GlobalPlatform,
Applicability verification of multi-application SE platform management (up to
now performed trials usually include one service. However users would prefer
a dynamic NFC environment including more than one service when
necessary),
Implementation of multiple SEs support within single mobile,
Exploration of MNOs existence in pre-installation and personalization of NFC
applications, whether it creates security related problems or not,
Comparison of bearer alternatives in OTA downloading and personalization
processes in terms of security, data transmission, and other issues,
Clarification of key management and key rotation issues, especially for each
SE alternatives when loading and installing applications,
Analysis of life-cycle management perspective of SIM Application Toolkit.
14
some important attacks on NFC tags. The major attacks described in [115] are infecting
NFC mobiles through NFC worms or worm-URL, which are hidden in a smart poster tag,
some spoofing attacks, as well as DOS attacks which can also frustrate the relationship
between customer and service provider.
Attackers can spoof the tag content, which means that attacker supplies false
information such as a fake domain name, false e-mail etc., that looks valid and the
system accepts by mistake. Smart poster URI spoofing is one of the best examples of
spoofing in terms of NFC [115]. The smart poster URI spoofing further allows for attacks
against web browsers, URLs as well as attacks against mobile telephony services using
SMS URIs, telephony URI, and so on. Mulliner aims to improve the fuzzing process
through automation and also develop more efficient methods for analyzing the
vulnerabilities since NFC devices are becoming more complex in future work.
It is possible for an attacker to create a malicious poster with modified NDEF tags by
altering an existing commercial poster [115, 144, 145] that leads malicious content
sharing with attacker. To handle attacks on NFC tags, trustworthiness of the tags on a
smart poster by signing them with appropriate encryption techniques is essential. One
solution is to use signatures in NDEF messages as mentioned in [126, 144]. The study of
[Roland] examines the NFC Forums Signature Record Type Definition (RTD) to enable
adding digital signatures to the NDEF message for protecting the data integrity as well as
enabling authentication. However in another study [144, 145], signature record types
vulnerabilities have been discovered and analyzed, and also some basic guidelines to
avoid the risk of such attacks are outlined. According to the results, signature record type
records needs development for enabling security of NDEF record within a tag.
15
16
NFC Tags
RF Interface
Solutions
Eavesdropping
MIM Attacks
Data Corruption
Data Modification
Data Insertion
DOS Attacks
Relay Attacks
Phishing by Social Engineering
Certificate-Based Authentication
Mechanisms
Key Management Policies for
Authentication and Integrity for
SE Control Measures on NFC SE
Mandatory Code Signing for NFC
Communication API
Linking Applications to Unique
Identifiers Cryptographically
17
5. NFC Ecosystem
From the ecosystem point of view [36], NFC industry has a new emerging business
environment opportunities and large value chain including several industries and
organizations such as mobile network operators, banking and payment services,
semiconductor producers and electronic appliances, software developers, other
merchants including transport operators and retailers. The potential business
opportunities of NFC technology has impressed many organizations with a great
excitement especially organizations in mobile financial services industry.
Since NFC technology is made up of several components, it cuts across boundaries of
many organizations from diverse business sectors. All parties have already experienced
and agreed on the fact that NFC services to end users cannot be provided by a single
firm. From the technical point of view, the standardization of NFC technology has already
started. However NFC take-off has been slower than expected. In [97,100], it is
mentioned that the use cases for the end customer are clear but the structure of the
ecosystem as well as its value chain is not set yet. The main reason of this slow take-off
is highly related with the formation of a common understanding and vision in NFC
technology among participating organizations and industries. Thus, a mutually beneficial
business model could not have been sustained yet.
In [7, 8, 9, 10], the deficiencies of NFC based solutions collaborating with existing
contactless and smart card standards are explored in a comprehensive approach. In
accordance with these studies, the problems within the NFC ecosystem can be identified
as follows:
Technological and operational problems:
18
Remote OTA
Services for
Managing SE
NFC Mobile
Issuing and
owning SE
Secure
Element
SE Issuer
19
In addition to this approach, a good methodology for sustaining NFC business models
is provided in [82]. This study explores NFC mobile ticketing business models holistically
and identifies critical issues that affect the commercial success of NFC ticketing service. It
utilizes a theoretical framework called as STOF (Service, Technology, Organization and
Finance) model, which offers a good analytic tool for identifying the critical issues related
to diverse participants within NFC mobile ticketing ecosystem. The framework focuses on
four interrelated domains as service, technology, organization, and finance to create a
holistic view in evaluating business models; hence it helps to create value for both
customers and other players within ecosystem.
Another study in [7] explains a technically transparent and uniform platform called
host application for managing multiple services dynamically on an NFC mobile,
irrespective of the handset type or manufacturer. This provides also well-structured
methodology to identify the commercial dependencies, problems within ecosystem, and
to distribute risks between key stakeholders. Actually practical implementation of such
business model proposals is missing in the literature. The literature review performed in
[Papermz] also indicates that approximately 9.46% of the NFC literature focuses on
NFC ecosystem and business issues. Business models of the NFC technology need to
be clearly considered with methodologies and design principles that have theoretical
proofing.
6. NFC Applications
Since NFC technology is started to be promoted, various real-life applications have
been evolved. An NFC literature review study in [135] revealed that, about 40% of the
NFC literature concentrated on developing new NFC applications. Indeed, design
artifacts, which propose composed applications or services operating in two or more
modes can be seen in NFC literature [134].
20
21
22
23
Peer-to-Peer Mode
Increases mobility
Decreases physical
effort
Ability to be adapted by
many scenarios
Easy to implement
Device pairing
24
25
7. Conclusion
In recent years, NFC has become an attractive research area for many researchers
and practitioners due to its exploding growth and its promising applications and related
services. The number of publications in NFC research area is increasing continuously
since 2005 [135]. With this study, we provide a comprehensive survey on NFC
technology and its ecosystem including review of all academic studies as well as some
valuable white papers of industry pioneers within NFC ecosystem. Such as survey study
is a beneficial way for understanding the current status of NFC research area.
Current academic studies on NFC are mainly published on conferences. In the
contrary only a few journal publications exist. We have reviewed all such publications and
referred the significant works in this survey. With this survey, we want to encourage more
insight into the critical issues and problems of NFC technology, and facilitate providing
solutions to the open research areas which are presented in this paper.
To sum up, there is a clear need especially for more journal publications to solve the
issues that have mentioned in the open research problem sections. Academicians and
researchers need to focus on these recommended research issues, and give publications
that have high level of research both in width and breadth [134, 135] to maintain the
advancement of knowledge in NFC research and to identify the gap between theory and
practice.
References
[1]
[2]
Aigner, M., Dominikus S., & Feldhofer, M., (2007). A System of Secure Virtual
Coupons Using NFC Technology. In Proceedings of Fifth Annual IEEE
International Conference on Pervasive Computing and Communications
Workshops, pp. 362-366.
Ali, W., El Kilani, W., & Hadhoud, M., (2010). Simulation of NFCIP-1 Protocol
over NS-2. In Proceedings of 7th International Conference on Informatics and
Systems, Cairo, Egypt, pp. 1-6.
26
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
27
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
28
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
Coskun, V., Ok, K., & Ozdenizci, B., (2012). Near Field Communication (NFC):
From Theory to Practice. John Wiley and Sons, ISBN: 978-1-1199-7109-2,
February 2012.
Damme, G., et al., (2009). Offline NFC Payments with Electronic Vouchers. In
Proceedings of the 1st ACM workshop on Networking, systems, and applications
for mobile handhelds, pp. 25-30.
Dobrigkeit, P., et al., (2008). Exchange of contact data between mobile phones
using NFCIP. In Proceedings of 4th European Workshop on RFID Systems and
Technologies, Freiburg, Germany, pp. 1-9.
Dominikus, S., & Aigner, M., (2007). mCoupons: An Application for Near Field
Communication (NFC). In Proceedings of 21st International Conference on
Advanced Information Networking and Applications Workshops, Niagara Falls, pp.
421 - 428.
Dnnebeil, S., et al., (2011). Encrypted NFC emergency tags based on the
German Telematics Infrastructure. In Proceedings of 3rd International Workshop
on Near Field Communication, Hagenberg, Austria, pp. 50-55.
ECMA International (2004). ECMA 340: Near Field Communication Interface and
Protocol (NFCIP-1).
Available at: http://www.ecma-international.org/memento/TC47-M.htm.
ECMA International (2006). ECMA 373: Near Field Communication Wired
Interface (NFC-WI).
Available at: http://www.ecma-international.org/memento/TC47-M.htm.
ECMA International (2008). NFC-SEC, White Paper. Available at:
http://www.ecma-international.org/activities/Communications/tc47-2008-089.pdf
ECMA International (2010). ECMA 352: Near Field Communication Interface and
Protocol (NFCIP-2).
Available at: http://www.ecma-international.org/memento/TC47-M.htm.
Ervasti, M., et al., (2009). Bringing Technology into School NFC-enabled
School Attendance Supervision. In Proceedings of the 8th International Conference
on Mobile and Ubiquitous Multimedia, Article (4).
Ervasti, M., et al., (2009). Experiences from NFC Supported School Attendance
Supervision for Children, In Proceedings of Third International Conference on
Mobile Ubiquitous Computing, Systems, Services and Technologies, Sliema, pp.
22-30.
ETSI TS (2008). ETSI TS 102 613, Smart Cards; UICC - Contactless Front-end
(CLF) Interface; Part 1: Physical and data link layer characteristics, Technical
Specification.
ETSI TS (2008). ETSI TS 102 622, Smart Cards; UICC - Contactless Front-end
(CLF) Interface; Host Controller Interface (HCI), Technical Specification.
Finkenzeller, K., (2010). RFID Handbook: Fundamentals and Applications in
Contactless Smart Cards, Radio Frequency Identification and Near-Field
Communication, ISBN: 978-0-470-69506-7, John Wiley and Sons.
Fontecha, J., et al., (2011). An NFC Approach for Nursing Care Training. In
Proceedings of 3rd International Workshop on Near Field Communication,
Hagenberg, Austria, pp. 38-43.
Francis, L., (2010). A Security Framework Model with Communication Protocol
Translator Interface for Enhancing NFC Transactions. In Proceedings of Sixth
Advanced International Conference on Telecommunications, Barcelona, pp. 452461.
Francis, L., et al., (2010). On the security issues of NFC enabled mobile phones.
In International Journal of Internet Technology and Secured Transactions, 2 (3/4).
29
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
[65]
[66]
[67]
Francis, L., et al., (2010). Practical NFC peer-to-peer relay attack using mobile
phones. In Proceedings of the 6th international conference on Radio Frequency
Identification: Security and Privacy Issues, pp. 35-49.
Francis, L., Hancke, G., Mayes, K., & Markantonakis, K., (2009). Potential misuse
of NFC enabled mobile phones with embedded security elements as contactless
attack platforms. In Proceedings of International Conference for Internet
Technology and Secured Transactions, London, pp. 1-8.
Franssila, H., (2010). User Experiences and Acceptance Scenarios of NFC
Applications in Security Service Field Work. In Proceedings of the Second
International Workshop on Near Field Communication, Monaco, pp. 3944.
Fressancourt, A., Herault, C., & Ptak, E., (2009). NFCSocial: Social Networking in
Mobility Through IMS and NFC. In Proceedings of the 1st International Workshop
on Near Field Communication, Hagenberg, Austria, pp. 24-29.
Garrido, P. C., et al., (2011). Use of NFC-based Pervasive Games for
Encouraging Learning and Student Motivation. In Proceedings of 3rd International
Workshop on Near Field Communication, Hagenberg, Austria, pp. 33-37.
Gebhart, M., & Szoncso, R. (2010). Optimizing Design of Smaller Antennas for
Proximity Transponders. In Proceedings of the 2010 Second International
Workshop on Near Field Communication, Monaco, pp. 77-82.
Ghiron, S. L., Sposato, S., Medaglia, C. M. & Moroni, A. (2009). NFC ticketing: A
Prototype and Usability Test of an NFC-based Virtual Ticketing Application. In
Proceedings of the First International Workshop on Near Field Communication,
Hagenberg, Austria, pp. 4550.
GlobalPlatform (2009). GlobalPlatforms Proposition for NFC Mobile: Secure
Element Management and Messaging. White Paper, Available at:
http://www.globalplatform.org/documents/GlobalPlatform_NFC_Mobile_White_Pap
er.pdf.
GlobalPlatform (2006). GlobalPlatform Card Specification, Version 2.2,
http://www.globalplatform.org/specificationscard.asp.
Globalplatform, GlobalPlatform Mobile Task Force (2010). Requirements for NFC
Mobile: Management of Multiple Secure Elements Version 1.0. Available at:
http://www.globalplatform.org/documents/whitepapers/GlobalPlatform_Requiremen
ts_Secure_Elements.pdf
Golovashych, S., (2005). The Technology of Identification and Authentication of
Financial Transactions From Smart Cards to NFC-Terminals. In Proceedings of
IEEE Intelligent Data Acquisition and Advanced Computing Systems: Technology
and Applications, Sofia, pp. 407-412.
Gossar, M., et al., (2011). Investigations to Achieve Very High Data Rates for
Proximity Coupling Devices at 13.56 MHz and NFC Applications. In Proceedings of
the 3rd International Workshop on Near Field Communication, Hagenberg, Austria,
pp.71-76.
Grunberger, S., & Langer, J., (2009). Analysis and test results of tunneling IP
over NFCIP-1. In Proceedings of the First International Workshop on Near Field
Communication, Hagenberg, Austria, pp. 93-97.
GSMA, (2007). Pay-Buy Mobile Business Opportunity Analysis, Version 1.0,
White Paper.
Available at: http://www.gsmworld.com/documents/gsma_nfc_tech_guide_vs1.pdf.
Haikio, J., Tuikka, T., Siira, E. & Tormanen, V., (2010). Would You Be My
Friend?Creating a Mobile Friend Network with Hot in the City. In Proceedings of
the 43rd Hawaii international conference on system sciences, Hawaii, USA, pp. 1
10.
30
[68]
[69]
[70]
[71]
[72]
[73]
[74]
[75]
[76]
[77]
[78]
[79]
[80]
[81]
[82]
[83]
Hardy, R., & Rukzio, E., (2008). Touch & Interact: Touch-based Interaction of
Mobile Phones with Displays. In Proceedings of the 10th International Conference
on Human Computer Interaction with Mobile Devices and Services, pp. 245-254.
Hardy, R., & Rukzio, E., (2008). Touch & Interact: Touch-based Interaction with a
Tourist Application. In Proceedings of the 11th International Conference on
Human-Computer Interaction with Mobile Devices and Services, Bonn, Germany.
Hardy, R., et al., (2010). MyState: Using NFC to Share Social and Contextual
Information in a Quick and Personalized Way. In Proceedings of the 12th ACM
International Conference Adjunct Papers on Ubiquitous Computing, Copenhagen,
Denmark, pp. 447-448.
Haselsteiner, E., & Breitfu, K., (2006). Security in Near Field Communication
(NFC), Philips Semiconductors.
Available
at:
http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20%20Security%20in%20NFC.pdf.
Ho, T. & Chen, R., (2011). Leveraging NFC and LBS Technologies to Improve
User Experiences. In Proceedings of International Joint Conference on Service
Sciences, Taiwan, pp. 17-21.
Hsiang, H. C., et al., (2009). A Secure Mcoupon Scheme Using Near Field
Communication. International Journal of Innovative Computing, Information and
Control, Volume 5, Number 11.
Iglesias, R., et al., (2009). Experiencing NFC-based Touch for Home Healthcare.
In Proceedings of the 2nd International Conference on Pervasive Technologies
Related to Assistive Environments, Corfu, Greece.
Isomursu, M., (2008). Tags and the City. PsychNology Journal, 6 (2), pp. 131156.
Ivanov, R., (2010). Indoor Navigation System for Visually Impaired. In
Proceedings of International Conference on Computer Systems and Technologies,
Sofia, Bulgaria.
Jara, A. J., et al., (2010). A Pharmaceutical Intelligent Information System to
Detect Allergies and Adverse Drugs Reactions based on Internet of Things. In
Proceedings of 8th IEEE International Conference on Pervasive Computing and
Communications Workshops, Mannheim, pp. 809-812.
Jara, Antonio J., et al., (2010). Evaluation of the security capabilities on NFCpowered devices. In Proceedings of European Workshop on Smart Objects:
Systems, Technologies and Applications, Ciudad, Spain, pp. 1-9.
Jara, Antonio J., Zamora, Miguel A., & Skarmeta, Antonio F. G., (2009). Secure
use of NFC in medical environments. In Proceedings of 5th European Workshop
on RFID Systems and Technologies, Bremen, Germany, pp. 1-8.
Jara, J., et al., (2010). Drugs Interaction Checker based on IoT. In Proceedings of
Internet of Things, Tokyo, pp. 1 - 8.
Jaring, P., Tormanen, V., Siira, E., & Matinmikko, T., (2007). Improving Mobile
Solution Workflows and Usability Using Near Field Communication Technology. In
Proceedings of the 2007 European Conference on Ambient Intelligence,
Darmstadt, Germany, pp. 358373.
Juntunen, A., Luukkainen, S., & Tuunainen, V.K., (2010). Deploying NFC
Technology for Mobile Ticketing Services-Identification of Critical Business Model
Issues. In Proceedings of Ninth International Conference on Mobile Business and
2010 Ninth Global Mobility Roundtable, pp. 82-90.
Kadambi, K. S., et al., (2009). Near-Field Communication-Based Secure Mobile
Payment Service. In Proceedings of the 11th International Conference on
Electronic Commerce, pp. 142-151.
31
[84]
Kalman, G., & Noll, J., (2007). SIM as Secure Key Storage in Communication
Networks. In Proceedings of 3rd International Conference on Wireless and Mobile
Communications, Guadeloupe, pp. 55-55.
[85]
Karpischek, S., Michahelles, F., Bereuter, A., & Fleisch, E., (2009). A
Maintenance System Based on Near Field Communication. In Proceedings of the
3rd International Conference on Next Generation Mobile Applications, Services
and Technologies, Cardiff, Wales, UK, pp. 234-238.
[86]
Karpischek, S., Michahelles, F., Resatsch, F., & Fleisch, E., (2009). Mobile Sales
Assistant An NFC-Based Product Information System for Retailers. In
Proceedings of the 1st International Workshop on Near Field Communication,
Hagenberg, Austria, pp. 20-23.
[87]
Kefalakis, N., et al., (2008). Supply Chain Management and NFC Picking
Demonstrations using the AspireRfid Middleware Platform. In Proceedings of the
ACM/IFIP/USENIX Middleware 08 Conference Companion, Leuven, Belgium, pp.
66-69.
[88]
Kennedy, T. & Hunt, R., (2008). A review of WPAN security: attacks and
prevention. In Proceedings of the International Conference on Mobile Technology,
Applications, and Systems, Article 56.
[89]
Kneissl, F., et al., (2009). All-I-Touch as Combination of NFC and Lifestyle. In
Proceedings of 1st International Workshop on Near Field Communication,
Hagenberg, Austria, pp. 51-55.
[90]
Kbler, F., Koene, P., Krcmar, H., Altmann, M., & Leimeister, J. M., (2010).
LocaTag An NFC-Based System Enhancing Instant Messaging Tools with RealTime User Location. In Proceedings of the 2nd International Workshop on Near
Field Communication, Monaco, pp. 57-61.
[91]
Laukkanen, M., (2007). Towards Operating Identity-based NFC Services. In
Proceedings of IEEE International Conference on Pervasive Services, Istanbul, pp.
92-95.
[92]
Liikka, J., et al., (2008). KAMO - Mobile guide for the city traveller. In Proceedings
of 4th International Conference on Intelligent Environments, Seattle, WA, pp. 1-7.
[93]
Lin., W., et al., (2009). Optimization of NFC Compatible Transponder with
Respect to the Nonlinear IC Impedance. In Proceedings of International Microwave
Workshop on Wireless Sensing, Local Positioning, and RFID, Croatia, pp. 1-4.
[94]
Lin, Y. S., et al., (2009). Near-Field Communication using Phase-Locking and
Pulse Signaling for Millimeter-Scale Systems. In Proceedings of IEEE 2009
Custom Integrated Circuits Conference (CICC), San Jose, CA, pp. 563-566.
[95]
Lpez-de-Ipia, D., (2007). Touch Computing: Simplifying Human to Environment
Interaction through NFC Technology. In 1as Jornadas Cientficas sobre RFID, 21 a
23 de noviembre de 2007.
[96]
Lou, Z., (2010). NFC Enabled Smart Postal System. In Proceedings of the 2nd
International Workshop on Near Field Communication, Monaco, pp. 33-38.
[97]
Madlmayr, G., (2008). A mobile trusted computing architecture for a Near Field
Communication ecosystem. In Proceedings of the 10th International Conference
on Information Integration and Web-based Applications & Services, pp. 563-566.
[98]
Madlmayr, G., et al., (2007). The benefit of using SIM application toolkit in the
context of near field communication applications. In Proceedings of International
Conference on the Management of Mobile Business, Toronto, pp. 5-5.
[99]
Madlmayr, G., et al., (2008). Management of Multiple Cards in NFC-Devices. In
Smart Card Research and Advanced Applications, Volume 5189/2008, pp. 149161.
[100] Madlmayr, G., et al., (2008). Managing an NFC Ecosystem. In Proceedings of 7th
International Conference on Mobile Business, Barcelona, pp. 95-101.
32
[101]
[102]
[103]
[104]
[105]
[106]
[107]
[108]
[109]
[110]
[111]
[112]
[113]
[114]
[115]
[116]
Madlmayr, G., et al., (2008). NFC Devices: Security and Privacy. In Proceedings
of Third International Conference on Availability, Reliability and Security,
Barcelona, pp. 642 - 647.
Madlmayr, G., Langer, J., Kantner, C., Scharinger, J., & Schaumller-Bichl, I.,
(2009). Risk Analysis of Over-the-Air Transactions in an NFC Ecosystem. In
Proceedings of the 1st International Workshop on Near Field Communication,
Hagenberg, Austria, pp. 87-92.
Mair, R.G., (2010). Protocol-Independent Detection of Passive Transponders for
Near-Field Communication Systems. In IEEE Transactions on Instrumentation and
Measurement, 59(4).
Marcus, A., Davidzon, G., Law, D., Verma, N., Fletcher, R., Khan, A., &
Sarmenta, L. (2009). Using NFC-enabled Mobile Phones for Public Health in
Developing Countries. In Proceedings of the 1st International Workshop on Near
Field Communication, Hagenberg, Austria, pp. 30-35.
Michahelles, F., et al., (2007). Pervasive RFID and Near Field Communication
Technology. In Journal of IEEE Computer Society, Pervasive Computing, pp.
1536-1268.
Miranda, S., & Pastorelly, N., (2011). NFC mobiquitous information service
prototyping at the University of Nice Sophia Antipolis and multi-mode NFC
application proposal. In Proceedings of the 3rd International Workshop on Near
Field Communication, Hagenberg, Austria, pp. 3-8.
Miraz, G. M., Ruiz, I. L., & Gomez-Nieto, M. A., (2009). How NFC can be used for
the Compliance of European Higher Education Area Guidelines in European
Universities. In Proceedings of the 1st International Workshop on Near Field
Communication, Hagenberg, Austria, pp. 3-8.
Miraz, G. M., Ruiz, I. L., & Gmez-Nieto, M. ., (2009). University of Things:
Applications of Near Field Communication Technology in University Environments.
Journal of E-working, 3 (1), 52-64.
Mitrokotsa, A., et al., (2008). Classification of RFID Attacks. In Journal of
Information Systems Frontiers, 12(5), pp. 491-505.
Mobey Forum (2010). Alternatives for Banks to Offer Secure Mobile Payments.
Available
at:
http://www.mobeyforum.org/Press-Documents/PressReleases/Alternatives-for-Banks-to-offer-Secure-Mobile-Payments.
Morak, J., Hayn, D., Kastner, P., Drobics, M., & Schreier, G., (2009). Near Field
Communication Technology as the Key for Data Acquisition In Clinical Research.
In Proceedings of the 1st International Workshop on Near Field Communication,
Hagenberg, Austria, pp. 15-19.
Morak, J., Schwetz, V., Hayn, D., Fruhwald, F., & Schreier, G., (2008). Electronic
Data Capture Platform for Clinical Research based on Mobile Phones and Near
Field Communication Technology. In Proceedings of the 30th Annual International
Conference of the IEEE Engineering in Medicine and Biology Society, Vancouver,
Canada, pp. 5334-5337.
Morris, S., & Lefley, A., (2009). A 90nm CMOS 13.56MHz NFC Transceiver. In
Proceedings of IEEE Asian Solid-State Circuits Conference, Taipei, pp. 25-28.
Mu al, ., Ramon, E., D az, E., Carrabina, ., Calle a, A., Mart nez, R., Ter s,
L., (2010). Inkjet Printed Antennas for NFC systems. In Proceedings of 17th IEEE
International Conference on Electronics, Circuits, and Systems, pp. 1220 - 1223.
Mulliner, C., (2009). Vulnerability Analysis and Attacks on NFC-enabled Mobile
Phones. In Proceedings of International Conference on Availability, Reliability and
Security, Fukuoka, pp. 695-700.
Nandwani, A., et al., (2011). NFC Mobile Parlor Games Enabling Direct Player to
Player Interaction. In Proceedings of 3rd International Workshop on Near Field
Communication, Hagenberg, Austria, pp. 21-25.
33
[117]
[118]
[119]
[120]
[121]
[122]
[123]
[124]
[125]
[126]
[127]
[128]
[129]
[130]
[131]
[132]
[133]
[134]
[135]
Neefs, J., Schrooyen, F., & Doggen, J., Paper ticketing vs. Electronic Ticketing
based on off-line system Tapango, In Proceedings of the Second International
Workshop on Near Field Communication, Monaco, pp. 3-8.
Nepper, P., Konrad, N., & Sandner, U., (2007). Talking Media. In Proceedings of
9th International Conference on Human Computer Interaction with Mobile Devices
and Services, Singapore.
NFC Forum (2006).
NFC Data Exchange Format (NDEF), Technical
Specification, Version 1.0.
NFC Forum (2006). Record Type Definition (RTD), Technical Specification,
Version 1.0.
NFC Forum (2006). Smart Poster Record Type Definition, Technical
Specification, Version 1.1.
NFC Forum (2006). Text Record Type Definition, Technical Specification, Version
1.0.
NFC Forum (2006). URI Record Type Definition, Technical Specification, Version
1.0.
NFC Forum (2009). Logical Link Control Protocol (LLCP), Technical
Specification, Version 1.0.
NFC Forum (2009). NFC Forum Tag Types. Available at: http://www.nfcforum.org/resources/white_papers/NXP_BV_Type_Tags_White_Paper-Apr_09.pdf,
2009.
NFC Forum (2010). Signature Record Type Definition, Technical Specification,
Version 1.0.
NFC Forum. Available at: http://www.nfc-forum.org
Ok, K., (2010). Current Benefits and Future Directions of NFC Services. In
Proceedings of IEEE International Conference on Education and Management
Technology, Cairo, Egypt, pp. 334-338.
Ok, K., (2010). Exploring Underlying Values of NFC Applications. In Proceedings
of International Conference on Management Technology and Applications,
Singapore, pp. 283-287.
Ok, K., Coskun, V., & Aydin, M. N., (2010). Usability of Mobile Voting with NFC
Technology. In Proceedings of IASTED International Conference on Software
Engineering, Innsbruck, Austria, pp. 151-158.
Ondrus, J., & Pigneur, Y., (2007). An Assessment of NFC for Future Mobile
Payment Systems. In Proceedings of the International Conference on the
Management of Mobile Business, p. 43.
Opperman, C. A., et al., (2011). A Generic NFC-enabled Measurement System
for Remote Monitoring and Control of Client-side Equipment. In Proceedings of 3rd
International Workshop on Near Field Communication, Hagenberg, Austria, pp. 4449.
Ozdenizci, B., Coskun, V., Aydin, M. & Ok, K. (2010). NFC Loyal: A Beneficial
Model to Promote Loyalty on Smart Cards of Mobile Devices. In Proceedings of
IEEE International Conference for Internet Technology and Secured Transactions,
London, pp. 134-139.
Ozdenizci, B., et al., (2010). Design Science in NFC Research. In Proceedings of
IEEE International Conference for Internet Technology and Secured Transactions,
London, pp. 158-163.
Ozdenizci, B., et al., (2010). NFC Research Framework: A Literature Review and
Future Research Directions. In Proceedings of 14th International Business
Information Management Association Conference on Global Business
Transformation through Innovation and Knowledge Management, Istanbul, Turkey,
pp. 2672-2685.
34
[136]
[137]
[138]
[139]
[140]
[141]
[142]
[143]
[144]
[145]
[146]
[147]
[148]
[149]
[150]
[151]
[152]
[153]
[154]
Ozdenizci, B., Ok, K., Coskun, V., & Aydin, M. (2011). Development of an Indoor
Navigation System Using NFC Technology. In Proceedings of Fourth International
Conference on Information and Computing, Phuket Island, pp. 11-14.
Pasquet, M., et al., (2008). Secure Payment With NFC Mobile Phones In The
Smart Touch Project, In Proceedings of International Symposium on Collaborative
Technologies and Systems, Irvine, CA, pp. 121 - 126.
Payez Mobile, http://www.payezmobile.com
Pering, T., et al., (2007). Gesture Connect: Facilitating Tangible Interaction With a
Flick Of The Wrist. In Proceedings of the 1st International Conference on Tangible
and Embedded Interaction, pp. 259 - 262.
Prinz, A., et al., (2011). inSERT An NFC-based Self Reporting Questionnaire
for Patients with impaired fine motor skills. In Proceedings of 3rd International
Workshop on Near Field Communication, Hagenberg, Austria, pp. 26-31.
Resatsch, F., (2010). Ubiquitous Computing. Gabler, ISBN: 978-3834921673.
Resatsch, F., et al., (2007). Mobile Sales Assistant - NFC for retailers. In
Proceedings of the 9th International Conference on Human Computer Interaction
with Mobile Devices and Services, pp. 313-316.
Reveilhac, M., & Pasquet, M., (2009). Promising Secure Element Alternatives for
NFC Technology. In Proceedings of the First International Workshop on Near Field
Communication, Hagenberg, Austria, pp. 75-80.
Roland, M., & Langer, J., (2010). Digital Signature Records for the NFC Data
Exchange Format. In Proceedings of 2nd International Workshop on Near Field
Communication, Monaco, pp. 71-76.
Roland, M., et al., Security Vulnerabilities of the NDEF Signature Record Type. In
Proceedings of the 3rd International Workshop on Near Field Communication,
Hagenberg, Austria, pp. 65-70.
Roland, M., Witschnig, H., Merlin, E., & Saminger, C., (2008). Automatic
Impedance Matching for 13.56 MHz NFC Antennas. In Proceedings of 6th
International Symposium on Communication Systems, Networks and Digital Signal
Processing, Graz, pp. 288-291.
Rudametkin, W., et al., (2008). NFCMuseum: an Open-Source Middleware for
Augmenting Museum Exhibits. In Advanced Sensors and lightweight
Programmable middleware for Innovative RFID Enterprise Applications.
Ruiz, I., et al., (2009). University Smart Poster: Study of NFC Technology
Applications for University Ambient. In Advances in Soft Computing, Volume 51,
pp. 112-116.
Sanchez, I., Riekki, J., & Pyykkonen, M., (2009). Touch & Compose: Physical
User Interface for Application Composition in Smart Environments. In Proceedings
of the First International Workshop on Near Field Communication, Hagenberg,
Austria, pp. 61-66.
Snchez, I., Corts, M., & Riekki, J. (2007). Controlling Multimedia Players using
NFC Enabled Mobile Phones. In Proceedings of the 6th International Conference
on Mobile and Ubiquitous Multimedia, Oulu, Finland, pp. 118- 124.
Snchez, I., et al, (2008). Touch & Control: Interacting with Services by Touching
RFID Tags. In Proceedings of the 2nd International Workshop on RFID Technology
- Concepts, Applications, Challenges (IWRT 08).
Snchez, I., et al., (2011). NFC-based Interactive Learning Environments for
Children. In Proceedings of the 10th International Conference on Interaction
Design and Children, pp. 205-208.
Sandner, U., et al., (2007). News-on-the-Go. In Proceedings of Mobile HCI'07,
Singapore, pp. 361-363.
Schoo, P., & Paolucci, M., (2009). Do you talk to each poster? Security and
Privacy for Interactions with Web Service by means of Contact Free Tag Readings.
35
[155]
[156]
[157]
[158]
[159]
[160]
[161]
[162]
[163]
[164]
[165]
[166]
[167]
[168]
[169]
36